ACNSĄŻ04 PROGRAM ¨C Academic Track

 

 

Day 1 (Tuesday, June 8)

 

Opening Ceremony (Chair: Thomas Berson)

 

Session 1: Security and Storage (Chair: Robert Deng)

 

                CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems

on the Cheap

Michael E. Locasto and Angelos D. Keromytis

 

                Private Keyword-Based Push and Pull with Applications to Anonymous Communication

Lea Kissner and Alina Oprea and Michael Reiter and Dawn Song and Ke Yang

 

                Secure Conjunctive Keyword Search over Encrypted Data

Philippe Golle and Jessica Staddon and Brent Waters

 

Session 2: Provably Secure Constructions (Chair: Markus Jakobsson)

 

                Evaluating Security of Voting Schemes in the Universal Composability Framework

Jens Groth

 

                Verifiable Shuffles: A Formal Model and a Paillier-based Efficient Construction with

Provable Security

Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa

 

                On the Security of Cryptosystems with All-or-Nothing Transform

Rui Zhang and Goichiro Hanaoka and Hideki Imai

 

Session 3: Internet Security (Chair: Jianying Zhou)

 

                Centralized Management of Virtual Security Zones in IP Networks

Antti Peltonen and Teemupekka Virtanen and Esa Turtiainen

 

                S-RIP: A Secure Distance Vector Routing Protocol

Tao Wan and Evangelos Kranakis and Paul Van Oorschot

 

                A Pay-per-Use DoS Protection Mechanism for the Web

Angelos Stavrou and John Ioannidis and Angelos D. Keromytis and Vishal Misra and

Dan Rubenstein

 

Session 4: Digital Signature (Chair: David Naccache)

 

                Limited Verifier Signature from Bilinear Pairings

Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim

 

                Deniable Ring Authentication Revisited

Willy Susilo and Yi Mu

 

                A Fully-Functional Group Signature Scheme over Only Known-Order Group

Atsuko Miyaji and Kozue Umeda

 

Day 2 (Wednesday, June 9)

 

Session 5: Security Modeling (Chair: Moti Yung)

 

                Some Observations on Zap and Its Applications

Yunlei Zhao and C. H. Lee and Yiming Zhao and Hong Zhu

 

                Security Measurements of Steganographic Systems

Weiming Zhang and Shiqu Li

 

                X2Rep: Enhanced Trust Semantics for the XRep Protocol

Nathan Curtis and Rei Safavi-Naini and Willy Susilo

 

Session 6: Authenticated Key Exchange (Chair: Atsuko Miyaji)

 

                One-Round Protocols for Two-Party Authenticated Key Exchange

Ik Rae Jeong and Jonathan Katz and Dong Hoon Lee

 

                Password Authenticated Key Exchange Using Quadratic Residues

Muxiang Zhang

 

                Key Agreement using Statically Keyed Authenticators

Colin Boyd and Wenbo Mao and Kenneth G. Paterson

 

Session 7: Security of Deployed Systems (Chair: Philippe Golle)

 

                Low-Latency Cryptographic Protection for SCADA Communications

Andrew K. Wright and John A. Kinast and Joe McCarty

 

                A Best Practice for Root CA Key Update in PKI

InKyoung Jeun and JongWook Park and TaeKyu Choi and SangWan Park and

BaeHyo Park and ByungKwon Lee and YongSub Shin

 

                SQLrand: Preventing SQL Injection Attacks

Stephen W. Boyd and Angelos D. Keromytis

 

Session 8: Cryptosystems: Design and Analysis (Chair: Rana Barua)

 

                Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem

Bin Zhang and Hongjun Wu and Dengguo Feng and Feng Bao

 

                Success Probability in c2-attacks

Takashi Matsunaka and Atsuko Miyaji and Yuuki Takano

 

                More Generalized Clock-Controlled Alternating Step Generator

Ali A. Kanso


Day 3 (Friday, June 11)

 

Session 9:Cryptographic Protocols (Chair: Angelos D. Keromytis)

 

                FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy

Daisuke Inoue and Masahiro Kuroda

 

                Unconditionally Non-Interactive Verifiable Secret Sharing Secure Against

Faulty Majorities in the Commodity Based Model

Anderson C. A. Nascimento and Joern Mueller-Quade and Akira Otsuka and

Goichiro Hanaoka and Hideki Imai

 

                Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and

An Improvement for True Anonymity

Bok-Min Goi and Raphael C.-W. Phan and Yanjiang Yang and Feng Bao and

Robert H. Deng and M. U. Siddiqi

 

Session 10: Side Channels and Protocol Analysis (Chair: Feng Bao)

 

                Security Analysis of CRT-based Cryptosystems

Katsuyuki Okeya and Tsuyoshi Takagi

 

Cryptanalysis of the Countermeasures using Randomized Binary Signed Digits

Dong-Guk Han and Katsuyuki Okeya and Tae Hyun Kim and

Yoon Sung Hwang and Young-Ho Park and Souhwan Jung

 

                Weaknesses of a Password-authenticated Key Exchange Protocol Between Clients

with Different Passwords

Shuhong Wang and Jie Wang and Maozhi Xu

 

Session 11: Intrusion Detection and DoS (Chair: Teemupekka Virtanen)

 

                Advanced Packet Marking Mechanism with Pushback for IP Traceback

Hyung-Woo Lee

 

                A Parallel Intrusion Detection System for High-Speed Networks

Haiguang  Lai and Shengwen  Cai and Hao Huang and Junyuan Xie and Hui Li

 

                A Novel Framework for Alert Correlation and Understanding

Dong Yu and Deborah Frincke

 

Session 12: Cryptographic Algorithms (Chair: Jens Groth)

 

                An Improved Algorithm for uP+vQ using JSF_3

Bai-Jie Kuang and Yue-Fei Zhu and Ya-Juan Zhang

 

                New Table Look-up Methods for Faster Frobenius Map Based Scalar Multiplications

over GF(pn)

Palash Sarkar and Pradeep Kumar Mishra and Rana Barua

 

                Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions

Riza Aditya and Kun Peng and Colin Boyd and Ed Dawson and Byoungcheon Lee